<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462022000100039</article-id>
<article-id pub-id-type="doi">10.13053/cys-26-1-4150</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[LSB Algorithm to Hide Text in an Audio Signal]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sánchez Rinza]]></surname>
<given-names><![CDATA[Bárbara Emma]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Munive Morales]]></surname>
<given-names><![CDATA[L. Gerardo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Jaramillo Núñez]]></surname>
<given-names><![CDATA[Alberto]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Benemérita Universidad Autónoma de Puebla Facultad de Ciencias de la Computación ]]></institution>
<addr-line><![CDATA[Puebla ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Instituto Nacional de Astrofísica, Óptica y Electrónica Departamento de Óptica ]]></institution>
<addr-line><![CDATA[Puebla ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2022</year>
</pub-date>
<volume>26</volume>
<numero>1</numero>
<fpage>39</fpage>
<lpage>44</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462022000100039&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462022000100039&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462022000100039&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: The following work is to hide a text in an audio file using steganography employing the LSB algorithm. 3 melodies of different genres are used to see by which of the 3, the information is best hidden, without there being any noise in the melody that will contain the hidden message. This is quite important in steganography because it is required that information goes unnoticed. To do so, we programmed in Matlab, and in this case, our hidden message contains around 9429 characters.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Steganography]]></kwd>
<kwd lng="en"><![CDATA[cryptography]]></kwd>
<kwd lng="en"><![CDATA[WAV]]></kwd>
<kwd lng="en"><![CDATA[information security]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nehru]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Dhar]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A detailed look of audio steganography techniques using LSB and genetic algorithm approach]]></article-title>
<source><![CDATA[International Journal of Computer Science Issues]]></source>
<year>2012</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>402-6</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Díaz-Vico]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Esteganografía y estegoanálisis: Ocultación de datos en streams de audio vorbis]]></source>
<year>2010</year>
<publisher-name><![CDATA[Facultad de Informática]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Adhiya]]></surname>
<given-names><![CDATA[K.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Patil]]></surname>
<given-names><![CDATA[S.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hiding Text in Audio Using LSB Based Steganography]]></article-title>
<source><![CDATA[Information and Knowledge Management]]></source>
<year>2012</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>8-15</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Afrakhteh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Steganography based on utilizing more surrounding pixels]]></source>
<year>2010</year>
<page-range>1-94</page-range><publisher-loc><![CDATA[Malaysia ]]></publisher-loc>
<publisher-name><![CDATA[Faculty of Computer Science and Information Systems, Universiti Teknologi]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[D.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Tsai]]></surname>
<given-names><![CDATA[W.H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A steganography method for images by pixel-value differencing]]></article-title>
<source><![CDATA[Pattern Recognition Letters]]></source>
<year>2013</year>
<volume>24</volume>
<numero>9-10</numero>
<issue>9-10</issue>
<page-range>1613-26</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Malviya]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Saxena]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Khare]]></surname>
<given-names><![CDATA[D.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Audio steganography by different method]]></article-title>
<source><![CDATA[International Journal of Emerging Technology and Advanced Engineering]]></source>
<year>2012</year>
<volume>2</volume>
<numero>7</numero>
<issue>7</issue>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jayaram]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ranganatha]]></surname>
<given-names><![CDATA[H.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Anupama]]></surname>
<given-names><![CDATA[H.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Information hiding using audio steganography &#8211; A survey]]></article-title>
<source><![CDATA[The International Journal of Multimedia &amp; Its Applications]]></source>
<year>2011</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carvajal-Gámez]]></surname>
<given-names><![CDATA[B.E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Técnica de inserción de información en video aprovechando el mismo ancho de banda]]></source>
<year>2008</year>
<publisher-name><![CDATA[Instituto Politécnico Nacional]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez-Rinza]]></surname>
<given-names><![CDATA[B.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Morales-Salgado]]></surname>
<given-names><![CDATA[M.R.G.]]></given-names>
</name>
<name>
<surname><![CDATA[Cortez-Olguín]]></surname>
<given-names><![CDATA[C.O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security system for sending information containing hidden voice data by steganography (SIOVE) using MatLab]]></article-title>
<source><![CDATA[International Journal of Engineering and Innovative Technology]]></source>
<year>2015</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
